Review:The Certified Information Systems Security Professional (CISSP) rating is difficult to earn and rare in the marketplace, which means you're a valuable commodity if you've proven your skills by passing the exam. The CISSP Prep Guide, one of only a handful of books on its subject, does a good job of giving readers a feel for the scope of the test and the style of its questions. It's ideal for use either as a preliminary survey of the CISSP subject areas (the test's publisher and the authors of this book call them "domains") for relative newcomers to computer security, or as a pure study guide to help more experienced professionals zero in on the weak spots in their knowledge. Don't expect to do well on the CISSP exam having only read this boo... Rest of this review on the detail page(Review by amazon.com)I want to add my review for this book!Reviews (3) and details of The CISSP Prep Guide: Mastering the Ten Domains of Computer Security

Review:
This is a broad but very general overview of modern communications security
theories and standards.
Chapters cover fundamental concepts, layered architectures, cryptography,
authentication, access control, integrity, non-repudiation, architecture,
standards, protocols and management. Although stated to be a tutorial and
reference, the book is written like an academic textbook. An advantage of this
is a large bibliography.
The book has little or no direct practical application. It does provide a
solid vocabulary and knowledge of related standards. (There is, however, no
mention of either Clipper or PGP.)
copyright Robert M. Slade, 1994(Review by Rob Slade)I want to add my review for this book!Reviews (1) and details of Computer Communications Security: Principles, Standard Protocols and Techniques

Book descriptionFollowing on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool.The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in... Rest of this review on the detail pageI want to add my review for this book!Reviews (2) and details of Handbook of Computer Crime Investigation: Forensic Tools & Technology

Review:
As a guide for law enforcement personnel and systems managers, this provides a
good overview and introduction to computer crime and the actions to take
against it. Touching on crime, prevention and prosecution, the book is
practical and helpful to those needing to get a quick handle on the problem.
It is, however, easily evident that the authors are law enforcement, rather
than systems, professionals. Those expecting a technical discussion, from the
O'Reilly imprimatur, will be disappointed. The book started life as an
official FBI training manual. The explanations and concepts are elementary--
and are intended to be so. Thus, while it might be possible to argue (rather
weakly) for the definitions of viruses, worms and other malwar... Rest of this review on the detail page(Review by Rob Slade)I want to add my review for this book!Reviews (1) and details of Computer Crime: A Crimefighter's Handbook (Computer Security)